_________________________________________________________________________
GET THE FREE NATIONAL CYBER SECURITY APP FOR YOUR PHONE AND TABLET

What if a team of Chinese agents had broken into the Pentagon or — less box office but just as bad — the US Office of Personnel Management and carted out classified documents?
The next day, the newspapers and morning TV shows would show pictures of the broken locks and rummaged filing cabinets. And if we caught the Chinese spies in the act, perp-walking them for the world to see?
My hunch is that the airwaves would be full of people talking about how “this was an act of war.” And I have no doubt that if the situation were reversed and we had sent our team to Beijing, the Chinese would definitely see it as an act of war.
Meanwhile, in real life, the Chinese stole millions of personnel files and mountains of background-check information from the US government.
I suppose I should say the Chinese “allegedly” stole the information, but many lawmakers, government officials, anonymous intelligence sources and industry experts are convinced that the Chinese did it.
Besides, we normally use “allegedly” in such cases because we don’t want to prejudice a jury — and this case isn’t going to court.
The damage is hard to exaggerate.
Former NSA counterintelligence officer John Schindler calls it a “disaster” in a column headlined “China’s hack just wrecked American espionage.”
Joel Brenner, America’s top counterintelligence official from 2006 to 2009, says the stolen data amounts to the “crown jewels” of American intelligence. “This tells the Chinese the identities of almost everybody who has got a United States security clearance,” he told the Associated Press.
Countless current and past federal employees are now extremely vulnerable to blackmail and even recruitment by Chinese intelligence operatives.
Millions are open to identity theft. The files included all of their personal information, including Social Security numbers, and in many cases medical, family, romantic and substance-abuse histories.
Many are calling it a “cyber Pearl Harbor.”
And yet, this news took a back seat to Hillary Clinton’s second announcement that she’s running for president, iPhone footage of a hotheaded cop breaking up a Texas pool party, and the admittedly hilarious revelation that an obscure NAACP official in eastern Washington state isn’t really black.
Why?
I can think of a number of reasons. First, the White House did a good job downplaying the story. That effort was aided by the fact, as suggested above, that there are no good visuals to go with the headline. Stock footage of computer terminals is boring.
But that doesn’t get to the heart of the matter. Science fiction writer Arthur C. Clarke’s “third law” holds that “any sufficiently advanced technology is indistinguishable from magic.”
We may understand as an intellectual matter that hacking isn’t magic. But that doesn’t change the fact that this kind of crime doesn’t feel wholly real either. The media may be downplaying it, but the public seems underwhelmed as well.
In the first “Mission: Impossible” movie, Tom Cruise and his team of outlaws break into the CIA to steal the agency’s list of undercover spies around the world (the “NOC list”).
This is the plot device that justified a famous scene — now endlessly copied and parodied in popular culture — in which Cruise descends from the ceiling on a rope to avoid the heat-sensitive floor.
In the movie, Ving Rhames plays a computer hacker who provides Cruise with assistance by audio. The scene works dramatically, because it’s dramatic.
In real life, Cruise’s job is a redundancy. Rhames can now do it all. But just because hackers have replaced brazen thieves doesn’t make the theft any less real.
If the Chinese had stolen paper documents, they would have needed a convoy of 18-wheelers to haul out the boxes. Similarly, if Clinton had shredded paper records instead of deleting e-mail on her stealth server, I suspect that story would be more compelling as well.
We’ll likely be feeling the damage from this catastrophe for years. Perhaps in the process we’ll learn to take these attacks more seriously the next time they happen.